Professor Iqbal Gondal
Adjunct Professor
Campus
Find me on
- Publications
Cross-Domain Fake News Detection Through Fusion of Evidence from Multiple Social Media Platforms
- Journals
- DOI reference: 10.3390/fi17020061
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
- Journals
- DOI reference: 10.1145/3627536
The need for cybersecurity self-evaluation in healthcare
- Journals
- DOI reference: 10.1186/s12911-024-02551-x
Blended Ensemble Learning for Robust MITM Attack Detection and Classification in Smart Grid
- Conference Proceedings
- DOI reference: 10.1109/AUPEC59354.2023.10502977
Detecting Fake News of Evolving Events using Machine Learning: Case of Russia-Ukraine War
False Data Detection in a Clustered Smart Grid Using Unscented Kalman Filter
- Journals
- DOI reference: 10.1109/ACCESS.2022.3193781
Identification of Fake News: A Semantic Driven Technique for Transfer Domain
- Conference Proceedings
- DOI reference: 10.1007/978-981-99-1645-0_47
A Low-Level Hybrid Intrusion Detection System Based on Hardware Performance Counters
- Book Chapters
- DOI reference: 10.1201/9781003194538-9
Vulnerability Assessment framework for a Smart Grid
- Conference Proceedings
- DOI reference: 10.1109/GPECOM55404.2022.9815621
Spam Email Categorization with NLP and Using Federated Deep Learning
- Conference Proceedings
- DOI reference: 10.1007/978-3-031-22137-8_2
Cyber Resilience Modelling for the Operations of Hybrid Network
- Conference Proceedings
- DOI reference: 10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9928023
Fuzzy-Based Operational Resilience Modelling
- Conference Proceedings
- DOI reference: 10.1109/DSAA54385.2022.10032400
Sensitivity Analysis for Vulnerability Mitigation in Hybrid Networks
- Journals
- DOI reference: 10.3390/electronics11020238
A framework for data privacy and security accountability in data breach communications
- Journals
- DOI reference: 10.1016/j.cose.2022.102657
A survey on the adoption of blockchain in IoT: challenges and solutions
- Journals
- DOI reference: 10.1016/j.bcra.2021.100006
State estimation within ied based smart grid using kalman estimates
- Journals
- DOI reference: 10.3390/electronics10151783
Assessing Reliability of Smart Grid Against Cyberattacks using Stability Index
- Conference Proceedings
- DOI reference: 10.1109/AUPEC52110.2021.9597708
Malware detection in edge devices with fuzzy oversampling and dynamic class weighting
- Journals
- DOI reference: 10.1016/j.asoc.2021.107783
AFES: An Advanced Forensic Evidence System
- Conference Proceedings
- DOI reference: 10.1109/EDOCW52865.2021.00034
Malware Variant Identification Using Incremental Clustering
- Journals
- DOI reference: 10.3390/electronics10141628
Cross-compiler bipartite vulnerability search
- Journals
- DOI reference: 10.3390/electronics10111356
A Smart Priority-Based Traffic Control System for Emergency Vehicles
- Journals
- DOI reference: 10.1109/JSEN.2020.3023149
Reanimating historic malware samples
- Book Chapters
- DOI reference: 10.1007/978-3-030-62582-5_13
CDMC’19—The 10th International Cybersecurity Data Mining Competition
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-63833-7_20
Blockchain leveraged decentralized IoT eHealth framework
- Journals
- DOI reference: 10.1016/j.iot.2020.100159
Cyberattack triage using incremental clustering for intrusion detection systems
- Journals
- DOI reference: 10.1007/s10207-019-00478-3
Robust Malware Defense in Industrial IoT Applications Using Machine Learning with Selective Adversarial Samples
- Journals
- DOI reference: 10.1109/TIA.2019.2958530
Vulnerability Modelling for Hybrid Industrial Control System Networks
- Journals
- DOI reference: 10.1007/s10723-020-09528-w
Function Similarity Using Family Context
- Journals
- DOI reference: 10.3390/electronics9071163
Guest Editorial: Security, Reliability, Privacy, and Quality in Industrial Automation and Control
- Journals
- DOI reference: 10.1109/TIA.2020.2992575
Dynamically Recommending Repositories for Health Data: A Machine Learning Model
- Conference Proceedings
- DOI reference: 10.1145/3373017.3373041
Partial Undersampling of Imbalanced Data for Cyber Threats Detection
- Conference Proceedings
- DOI reference: 10.1145/3373017.3373026
Rapid health data repository allocation using predictive machine learning
- Journals
- DOI reference: 10.1177/1460458220957486
Mobile malware detection with imbalanced data using a novel synthetic oversampling strategy and deep learning
- Conference Proceedings
- DOI reference: 10.1109/WiMob50308.2020.9253433
API Based Discrimination of Ransomware and Benign Cryptographic Programs
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-63833-7_15
Identifying cross-version function similarity using contextual features
- Conference Proceedings
- DOI reference: 10.1109/TrustCom50675.2020.00110
State Estimation in the Presence of Cyber Attacks Using Distributed Partition Technique
Enhancing Model Performance for Fraud Detection by Feature Engineering and Compact Unified Expressions
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-38961-1_35
Guest Editorial Special Issue on Privacy and Security in Distributed Edge Computing and Evolving IoT
- Journals
- DOI reference: 10.1109/JIOT.2020.2980103
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Journals
- DOI reference: 10.3390/electronics9010173
A lightweight blockchain based framework for underwater iot
- Journals
- DOI reference: 10.3390/electronics8121552
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Conference Proceedings
- DOI reference: 10.1109/TrustCom/BigDataSE.2019.00108
Evolved similarity techniques in Malware Analysis
- Conference Proceedings
- DOI reference: 10.1109/TrustCom/BigDataSE.2019.00061
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Journals
- DOI reference: 10.3390/electronics8111210
Selective adversarial learning for mobile malware
- Conference Proceedings
- DOI reference: 10.1109/TrustCom/BigDataSE.2019.00044
A Decentralized Patient Agent Controlled Blockchain for Remote Patient Monitoring
- Conference Proceedings
- DOI reference: 10.1109/WiMOB.2019.8923209
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
- Conference Proceedings
- DOI reference: 10.1109/ICIT.2019.8754936
Generative malware outbreak detection
- Conference Proceedings
- DOI reference: 10.1109/ICIT.2019.8754939
Mobile malware detection: An analysis of deep learning model
- Conference Proceedings
- DOI reference: 10.1109/ICIT.2019.8755048
Multi-source cyber-attacks detection using machine learning
- Conference Proceedings
- DOI reference: 10.1109/ICIT.2019.8755006
Vulnerability modelling for hybrid IT systems
- Conference Proceedings
- DOI reference: 10.1109/ICIT.2019.8755005
Cybersecurity Indexes for eHealth
- Conference Proceedings
- DOI reference: 10.1145/3290688.3290721
Categorical features transformation with compact one-hot encoder for fraud detection in distributed environment
- Conference Proceedings
- DOI reference: 10.1007/978-981-13-6661-1_6
Survey of intrusion detection systems:techniques, datasets and challenges
- Journals
- DOI reference: 10.1186/s42400-019-0038-7
Blockchain leveraged task migration in body area sensor networks
- Conference Proceedings
- DOI reference: 10.1109/APCC47188.2019.9026409
Instruction Cognitive One-Shot Malware Outbreak Detection
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-36808-1_84
Mobile malware detection - An analysis of the impact of feature categories
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-04212-7_43
An anomaly intrusion detection system using C5 decision tree classifier
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-04503-6_14
A server side solution for detecting webInject: A machine learning approach
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-04503-6_16
A patient agent to manage blockchains for remote patient monitoring
- Conference Proceedings
- DOI reference: 10.3233/978-1-61499-914-0-105
Continuous Patient Monitoring with a Patient Centric Agent: A Block Architecture
- Journals
- DOI reference: 10.1109/ACCESS.2018.2846779
A survey of similarities in banking malware behaviours
- Journals
- DOI reference: 10.1016/j.cose.2017.09.013
Dynamic content distribution for decentralized sharing in tourist spots using demand and supply
- Conference Proceedings
- DOI reference: 10.1109/IWCMC.2017.7986611
Periodic associated sensor patterns mining from wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-70139-4_25
Improving authorship attribution in twitter through topic-based sampling
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-63004-5_20
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform
- Journals
- DOI reference: 10.1016/j.ins.2016.06.036
A Cultural Competence Organizational Review for Community Health Services: Insights From a Participatory Approach
- Journals
- DOI reference: 10.1177/1524839916689546
Decentralized content sharing among tourists in visiting hotspots
- Journals
- DOI reference: 10.1016/j.jnca.2016.11.010
Optimization Based Clustering Algorithms for Authorship Analysis of Phishing Emails
- Journals
- DOI reference: 10.1007/s11063-017-9593-7
'I AM YOUR PERFECT ONLINE PARTNER' ANALYSIS OF DATING PROFILES USED IN CYBERCRIME
- Journals
- DOI reference: 10.25275/apjabssv3i2ss5
Gene Selection and Classification of Human Lymphoma from Microarray Data
- Conference Proceedings
- DOI reference: 10.1007/11573067_38
An energy-time based load balancing technique for wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/issnip.2005.1595556
An exploratory trial implementing a community-based child oral health promotion intervention for Australian families from refugee and migrant backgrounds: a protocol paper for Teeth Tales
- Journals
- DOI reference: 10.1136/bmjopen-2013-004260
Wake-up timer and binary exponential backoff for ZigBee-based wireless sensor network for flexible movement control system of a self-lifting scaffold
- Journals
- DOI reference: 10.1177/1550147716666663
Gene expression imputation techniques for robust post genomic knowledge discovery
- Journals
- DOI reference: 10.1007/978-3-540-75767-2_9
Computational modelling strategies for gene regulatory network reconstruction
- Journals
- DOI reference: 10.1007/978-3-540-75767-2_10
Ameliorative missing value imputation for robust biological knowledge inference
- Journals
- DOI reference: 10.1016/j.jbi.2007.10.005
Multi-dimensional adaptive SINR based vertical handoff for heterogeneous wireless networks
How to improve postgenomic knowledge discovery using imputation
- Journals
- DOI reference: 10.1155/2009/717136
Inchoate Fault Detection Framework: Adaptive Selection of Wavelet Nodes and Cumulant Orders
- Journals
- DOI reference: 10.1109/TIM.2011.2172112
Machine health monitoring based on stationary wavelet transform and fourth-order cumulants
- Journals
- DOI reference: 10.7158/E10-860.2012.9.1
On Temporal Order Invariance for View-Invariant Action Recognition
- Journals
- DOI reference: 10.1109/TCSVT.2012.2203213
Multi-step support vector regression and optimally parameterized wavelet packet transform for machine residual life prediction
- Journals
- DOI reference: 10.1177/1077546311435349
Social-connectivity-aware vertical handover for heterogeneous wireless networks
- Journals
- DOI reference: 10.1016/j.jnca.2013.01.010
Context aware vertical soft handoff algorithm for heterogeneous wireless networks
A cross-layer approach for using multiple radio channels with directional beams in a suburban Ad Hoc network
Multiple radio channels and directional antennas in suburban ad hoc networks
A framework for a QoS based adaptive topology control system for wireless ad hoc networks with multibeam smart antennas
Carry me if you can: A utility based forwarding scheme for content sharing in tourist destinations
- Conference Proceedings
- DOI reference: 10.1109/APCC.2016.7581432
A warning based preemptive routing scheme for QoS maintenance in wireless ad hoc networks
A cross-layer approach for QoS topology control in wireless ad hoc networks
A novel color image fusion QoS measure for multi-sensor night vision applications
- Conference Proceedings
- DOI reference: 10.1109/ISCC.2010.5546579
Automated multi-sensor color video fusion for nighttime video surveillance
- Conference Proceedings
- DOI reference: 10.1109/ISCC.2010.5546791
LACAR: Location aided congestion aware routing in wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/WCNC.2010.5506713
CAM: Congestion avoidance and mitigation in wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/VETECS.2010.5494190
VSAMS: Video stabilization approach for multiple sensors
- Conference Proceedings
- DOI reference: 10.1109/DICTA.2010.76
Scarf: Semi-automatic colorization and reliable image fusion
- Conference Proceedings
- DOI reference: 10.1109/DICTA.2010.80
Efficient utilization of WLAN networks in the next-generation heterogeneous environments
- Conference Proceedings
- DOI reference: 10.1109/HPCC.2010.57
Diversified adaptive frequency rolling to mitigate self and static interferences
- Conference Proceedings
- DOI reference: 10.1109/HPCC.2010.59
Coexistence mechanism for industrial automation network
- Conference Proceedings
- DOI reference: 10.1109/HPCC.2010.58
Dynamic dwell timer for hybrid vertical handover in 4G coupled networks
- Conference Proceedings
- DOI reference: 10.1109/VETECS.2011.5956636
A new resource distribution model for improved QoS in an integrated WiMAX/WiFi architecture
- Conference Proceedings
- DOI reference: 10.1109/IWCMC.2011.5982544
Dynamic sensor selection for target tracking in wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/VETECF.2011.6092942
Severity invariant machine fault diagnosis
- Conference Proceedings
- DOI reference: 10.1109/ICIEA.2011.5975544
Cross layer modeling of contention-based MAC and deterministic routing protocols in multi-hop WSNs
- Conference Proceedings
- DOI reference: 10.1109/ICOIN.2011.5723137
CODAR: Congestion and delay aware routing to detect time critical events in WSNs
- Conference Proceedings
- DOI reference: 10.1109/ICOIN.2011.5723128
Dynamic resource allocation for improved QoS in WiMAX/WiFi integration
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-22288-7_12
Dual-channel based energy efficient event clustering and data gathering in WSNs
- Conference Proceedings
- DOI reference: 10.1109/APCC.2011.6152812
I-MAC: Energy efficient intelligent MAC protocol for wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/APCC.2011.6152792
Contextual action recognition in multi-sensor nighttime video sequences
- Conference Proceedings
- DOI reference: 10.1109/DICTA.2011.49
Resonant frequency band estimation using adaptive wavelet decomposition level selection
- Conference Proceedings
- DOI reference: 10.1109/ICMA.2011.5985687
Machine fault severity estimation based on adaptive wavelet nodes selection and SVM
- Conference Proceedings
- DOI reference: 10.1109/ICMA.2011.5986279
Action recognition using spatio-temporal distance classifier correlation filter
- Conference Proceedings
- DOI reference: 10.1109/DICTA.2011.86
On dynamic scene geometry for view-invariant action matching
- Conference Proceedings
- DOI reference: 10.1109/CVPR.2011.5995690
Optimally parameterized wavelet packet transform for machine residual life prediction
Envelope-wavelet packet transform for machine condition monitoring
Multiple-points fault signature's dynamics modeling for bearing defect frequencies
Optimally parameterized wavelet packet transform for incipient machine fault diagnosis
Unitary anomaly detection for ubiquitous safety in machine health monitoring
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-34500-5_43
Smart phone based machine condition monitoring system
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-34500-5_58
Dynamic sensors collaboration to balance the accuracy-lifetime trade-off in multiple-target tracking
- Conference Proceedings
- DOI reference: 10.1109/PIMRC.2012.6362870
Dynamic clusters graph for detecting moving targets using WSNs
- Conference Proceedings
- DOI reference: 10.1109/VTCFall.2012.6399265
Dynamic sensors selection for overlapped multiple-target tracking using eagerness
- Conference Proceedings
- DOI reference: 10.1109/VTCFall.2012.6399266
A novel vertical handover scheme for diminution in social network traffic
- Conference Proceedings
- DOI reference: 10.1109/WCNC.2012.6214216
Impact characterization of multiple-points-defect on machine fault diagnosis
- Conference Proceedings
- DOI reference: 10.1109/CoASE.2012.6386411
Multi-size-window spectral augmentation: Neural network bearing fault classifier
- Conference Proceedings
- DOI reference: 10.1109/ICIEA.2013.6566377
Fuzzy logic inspired bearing fault-model membership estimation
- Conference Proceedings
- DOI reference: 10.1109/ISSNIP.2013.6529827
Mobile agent based artificial immune system for machine condition monitoring
- Conference Proceedings
- DOI reference: 10.1109/ICIEA.2013.6566349
Smart phone based vehicle condition monitoring
- Conference Proceedings
- DOI reference: 10.1109/ICIEA.2013.6566378
Regularly frequent patterns mining from sensor data stream
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-42042-9_52
Mining associated sensor patterns for data stream of wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1145/2512840.2512853
ACSP-tree: A tree structure for mining behavioral patterns from wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/LCN.2013.6761312
Heuristic non parametric collateral missing value imputation: A step towards robust post-genomic knowledge discovery
- Conference Proceedings
- DOI reference: 10.1007/978-3-540-88436-1-32
Priority based expansion of neighborhood size for heterogeneous traffic routing in WSN
- Conference Proceedings
- DOI reference: 10.1145/2387027.2387045
An Adaptive Self-Configuration Scheme for Severity Invariant Machine Fault Diagnosis
- Journals
- DOI reference: 10.1109/TR.2012.2222612
Abrasion Modeling of Multiple-Point Defect Dynamics for Machine Condition Monitoring
- Journals
- DOI reference: 10.1109/TR.2013.2241231
Self and static interference mitigation scheme for coexisting wireless networks
- Journals
- DOI reference: 10.1016/j.compeleceng.2013.04.007
Vibration Spectrum Imaging: A Novel Bearing Fault Classification Approach
- Journals
- DOI reference: 10.1109/TIE.2014.2327555
A technique for parallel share-frequent sensor pattern mining from wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1016/j.procs.2014.05.012
A novel algorithm for mining behavioral patterns from wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2014.6889737
The role of love stories in Romance Scams: A qualitative analysis of fraudulent profiles
- Journals
- DOI reference: 10.5281/zenodo.56227
An efficient data extraction framework for mining wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-46675-0_54
Teeth Tales: a community-based child oral health promotion trial with migrant families in Australia
- Journals
- DOI reference: 10.1136/bmjopen-2014-007321
Mining Associated Patterns from Wireless Sensor Networks
- Journals
- DOI reference: 10.1109/TC.2014.2349515
Weighted ANN input layer for adaptive features selection for robust fault classification
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-26535-3_5
Share-Frequent Sensor Patterns Mining from Wireless Sensor Network Data
- Journals
- DOI reference: 10.1109/TPDS.2014.2377713
Translation Invariant Features from Cascaded Wavelet and Fourier Transforms for Bearing Fault Pattern Recognition Using Artificial Neural Network
- Journals
- DOI reference: 10.7763/IJMLC.2015.V5.475
Child oral health in migrant families: A cross-sectional study of caries in 1-4 year old children from migrant backgrounds residing in Melbourne, Australia
- Journals
- DOI reference: 10.1922/CDH_3698Gibbs07
A data mining approach for machine fault diagnosis based on associated frequency patterns
- Journals
- DOI reference: 10.1007/s10489-016-0781-3
Complex anomaly for enhanced machine independent condition monitoring
- Conference Proceedings
- DOI reference: 10.1109/ICOSST.2015.7396409
Content sharing among visitors with irregular movement patterns in visiting hotspots
- Conference Proceedings
- DOI reference: 10.1109/NCA.2015.16
A mapreduce based technique for mining behavioral patterns from sensor data
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-26561-2_18
Condition monitoring through mining fault frequency from machine vibration data
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2015.7280569
Content exchange among mobile tourists using users' interest and place-centric activities
- Conference Proceedings
- DOI reference: 10.1109/ICICS.2015.7459881
Autonomous behavior modeling approach for diverse anomaly detection application
- Conference Proceedings
- DOI reference: 10.1109/ICOSST.2014.7029331
Ethical Considerations When Using Online Datasets for Research Purposes
- Book Chapters
- DOI reference: 10.1016/B978-0-12-802916-9.00008-7
Sensor selection for tracking multiple groups of targets
- Journals
- DOI reference: 10.1016/j.jnca.2014.07.023
Action-02MCF: A robust space-time correlation filter for action recognition in clutter and adverse lighting conditions
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-48680-2_41
Generating Synthetic Datasets for Experimental Validation of Fraud Detection
Optimizing network control traffic in resource constrained MANETs
- Conference Proceedings
- DOI reference: 10.1109/TENCON.2005.300877
LACON: Localized autonomic configuration in pervasive sensor networks
Distributed and load-adaptive self configuration in sensor networks
- Conference Proceedings
- DOI reference: 10.1109/APCC.2005.1554122
Collateral missing value estimation: Robust missing value estimation for consequent microarray data processing
- Conference Proceedings
- DOI reference: 10.1007/11589990_30
An energy-aware dynamic clustering algorithm for load balancing in wireless sensor networks
- Journals
- DOI reference: 10.4304/jcm.1.3.10-20
Collateral missing value imputation: A new robust missing value estimation algorithm for microarray data
- Journals
- DOI reference: 10.1093/bioinformatics/bti345
Optimized routing for efficient mobility over IP networks for multimedia transmission
- Conference Proceedings
- DOI reference: 10.1109/ITCC.2003.1197534
Stacked regression ensemble for cancer class prediction
- Conference Proceedings
- DOI reference: 10.1109/INDIN.2005.1560481
Dynamic symmetrical topology models for pervasive sensor networks
- Conference Proceedings
- DOI reference: 10.1109/INMIC.2004.1492925
Transcriptional gene regulatory network reconstruction through cross platform gene network fusion
- Conference Proceedings
- DOI reference: 10.1007/978-3-540-75286-8_27
Coalesce gene regulatory network reconstruction: A cross-platform transcriptional gene network fusion framework
- Conference Proceedings
- DOI reference: 10.1109/TENCON.2006.343719
Adaptive self configuration for distributed load in sensor networks
- Conference Proceedings
- DOI reference: 10.1109/TENCON.2005.301027
